Results for Authentication

Okta is updating the Adaptive Multi-Factor Authentication capabilities of its Okta Identity Cloud. The updates aim to help ensure only the proper people get access to the right resources – and at only the appropriate time.

Four Ways To Adapt Your Security for Digital Transformation – And Keep Pace with the Speed of Business

2017-07-14

News of the Verizon data breach is just the latest reminder of how tough it is for CIOs and CISOs to balance ‘security’ vs ‘innovation’ in the age of digital transformation and hybrid (borderless) architectures. One Identity’s Todd Peterson shares 4 proven strategies for how security professionals can be responsive to business initiatives -- without compromising on security needs.

Centrify Analytics Service Uses Machine Learning and User Behavior To Stop Breaches in Real Time

2017-02-28

A Forrester Research study, commissioned by security firm Centrify, estimates 1 billion identities were compromised in 2016. The firm is also launching Centrify Analytics Service to shore up access protection with real-time analytics and machine learning.

ForgeRock Says IoT is Pushing Security To Become ‘Password-Less’ and More Friction-Free

2016-08-01

ForgeRock says it’s finally time to push ‘password-less’ security. The company is adding push authentication to its identity platform to enable password-less login and frictionless second factor authentication – for devices and human users.

Could identity become the DNA for delivering agile, strong, and situational security solutions for the new-gen digital enterprise? A growing number of security execs see the possibilities. IDN looks at the Cloud Identity Summit with execs from Ping Identity.

Centrify has cracked the code on a vexing problem for mobile users that need ultra-tight security, especially those in the government or highly-regulated environments. Thanks to Centrify's approach to ‘derived credentials,’ it offers smart card, 2-factor authentication.

Centrify Continues To Update Identity Management for Big Data with NoSQL Support

2015-10-29

As companies continue to embrace big data, all types of sensitive and regulated data are new high-value targets for hackers. In response, Centrify is optimizing the 4As of identity and access management – authentication, authorization, auditing and assurance – for Hadoop and NoSQL.

Ping Identity is delivering on its position that identity will be the best way to deliver security to the growing wave of extended enterprise use cases, including mobile, cloud and event IoT. IDN reviews components of Ping’s ‘Identity Defined Security’ initiative.

Citrix is updating its long-standing XenMobile EMM with a new architecture to deliver better mobile user experience – for both IT and end users. XenMobile 10 offers streamlined workflows, simplified deployment, easier end-to-end management and even user self-service.

This IDN guest post from David Gorton of Ping Identity illustrates how important the well-known ‘4As’ of access management [authentication, authorization, account management and auditing) are to ensuring that applications deployed into an IaaS will have the same level of security and functionality as apps left on-premises.

At Black Hat 2014, the best cloud security experts warned that spoofs, hacks, phishes and bots continue to pose risks for public and private cloud projects. With these threats in mind, IDN showcases companies that are moving to plug these cloud security gaps.

To help IT better ensuring the security of corporate data and apps. Dell is shipping an update to its SonicWall secure access gateway with features optimized for BYOD and mobile security and access control. The latest version can secure an employee’s mobile access to data and apps, whether they use managed or unmanaged devices.